| 0 |
| url |
VCID-2chf-23mc-d3dn |
| vulnerability_id |
VCID-2chf-23mc-d3dn |
| summary |
cups: access to uninitialized buffer in ipp.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10001 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24831 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24911 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24951 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24726 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24793 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24838 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24852 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24813 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24756 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24767 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00086 |
| scoring_system |
epss |
| scoring_elements |
0.24759 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-10001 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-10001
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2chf-23mc-d3dn |
|
| 1 |
| url |
VCID-3etj-2m21-ffa1 |
| vulnerability_id |
VCID-3etj-2m21-ffa1 |
| summary |
cups: Null Pointer Dereference in CUPS ipp_read_io() Leading to Remote DoS |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58364 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.30003 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29955 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31552 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32467 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32439 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32402 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32429 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32388 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32436 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.0013 |
| scoring_system |
epss |
| scoring_elements |
0.32463 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58364 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-58364
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3etj-2m21-ffa1 |
|
| 2 |
| url |
VCID-44ju-8618-vqht |
| vulnerability_id |
VCID-44ju-8618-vqht |
| summary |
A buffer overflow was addressed with improved bounds checking. This issue is fixed in macOS Catalina 10.15.2, Security Update 2019-002 Mojave, and Security Update 2019-007 High Sierra. In certain configurations, a remote attacker may be able to submit arbitrary print jobs. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8842 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57671 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57528 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57612 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57633 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57609 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57663 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57667 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57682 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57661 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00352 |
| scoring_system |
epss |
| scoring_elements |
0.57641 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8842 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-8842
|
| risk_score |
0.7 |
| exploitability |
0.5 |
| weighted_severity |
1.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-44ju-8618-vqht |
|
| 3 |
| url |
VCID-6mus-21kz-uuhz |
| vulnerability_id |
VCID-6mus-21kz-uuhz |
| summary |
cups: Session cookie generated by the CUPS web interface is easy to guess |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4300 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59268 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59226 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00377 |
| scoring_system |
epss |
| scoring_elements |
0.59263 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65554 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65602 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65632 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65598 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65649 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65662 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65682 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00492 |
| scoring_system |
epss |
| scoring_elements |
0.65668 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4300 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| purl |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chf-23mc-d3dn |
|
| 1 |
| vulnerability |
VCID-3etj-2m21-ffa1 |
|
| 2 |
| vulnerability |
VCID-44ju-8618-vqht |
|
| 3 |
| vulnerability |
VCID-7wg4-sc9v-bffk |
|
| 4 |
| vulnerability |
VCID-993k-m3sq-gufu |
|
| 5 |
| vulnerability |
VCID-am36-6m5v-fkba |
|
| 6 |
| vulnerability |
VCID-apyh-1uza-pffa |
|
| 7 |
| vulnerability |
VCID-aznw-8yer-xfhf |
|
| 8 |
| vulnerability |
VCID-ev9c-v5dv-37fb |
|
| 9 |
| vulnerability |
VCID-k4yw-jg6v-1bcc |
|
| 10 |
| vulnerability |
VCID-p8gy-dd3u-uqh4 |
|
| 11 |
| vulnerability |
VCID-q8a8-fd7r-1kg7 |
|
| 12 |
| vulnerability |
VCID-qxwq-vp9g-ukca |
|
| 13 |
| vulnerability |
VCID-vx54-r2dt-8ue5 |
|
| 14 |
| vulnerability |
VCID-wqu4-wys6-hfbb |
|
| 15 |
| vulnerability |
VCID-zxp7-6d69-tfhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6 |
|
|
| aliases |
CVE-2018-4300
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6mus-21kz-uuhz |
|
| 4 |
| url |
VCID-7wg4-sc9v-bffk |
| vulnerability_id |
VCID-7wg4-sc9v-bffk |
| summary |
cups: Information leak through Cups-Get-Document operation |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32360 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20097 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19921 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20017 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20037 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19992 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19934 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.20154 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19884 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00064 |
| scoring_system |
epss |
| scoring_elements |
0.19963 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32360 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-32360
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-7wg4-sc9v-bffk |
|
| 5 |
| url |
VCID-993k-m3sq-gufu |
| vulnerability_id |
VCID-993k-m3sq-gufu |
| summary |
cups: Authentication Bypass in CUPS Authorization Handling |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58060 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15471 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00049 |
| scoring_system |
epss |
| scoring_elements |
0.15401 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16395 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16551 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16532 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16494 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16436 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16376 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16411 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00053 |
| scoring_system |
epss |
| scoring_elements |
0.16496 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-58060 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-58060
|
| risk_score |
3.6 |
| exploitability |
0.5 |
| weighted_severity |
7.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-993k-m3sq-gufu |
|
| 6 |
| url |
VCID-am36-6m5v-fkba |
| vulnerability_id |
VCID-am36-6m5v-fkba |
| summary |
cups: libppd: remote command injection via attacker controlled data in PPD file |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47175 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96909 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96878 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96891 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96893 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96895 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96897 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96898 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.33103 |
| scoring_system |
epss |
| scoring_elements |
0.96905 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.33659 |
| scoring_system |
epss |
| scoring_elements |
0.96918 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-47175 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
| reference_url |
https://www.cups.org |
| reference_id |
www.cups.org |
| reference_type |
|
| scores |
| 0 |
| value |
8.6 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N |
|
| 1 |
| value |
Track* |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-09-27T14:43:04Z/ |
|
|
| url |
https://www.cups.org |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-47175
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
7.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-am36-6m5v-fkba |
|
| 7 |
| url |
VCID-apyh-1uza-pffa |
| vulnerability_id |
VCID-apyh-1uza-pffa |
| summary |
In array_find of array.c, there is a possible out-of-bounds read due to an incorrect bounds check. This could lead to local information disclosure in the printer spooler with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-111210196 |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-2228 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28106 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28179 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28222 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28017 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28084 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28128 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28134 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28091 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28033 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28043 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.28026 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-2228 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-2228
|
| risk_score |
null |
| exploitability |
0.5 |
| weighted_severity |
0.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-apyh-1uza-pffa |
|
| 8 |
| url |
VCID-aznw-8yer-xfhf |
| vulnerability_id |
VCID-aznw-8yer-xfhf |
| summary |
Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34241 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09741 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09686 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.0979 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09768 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09785 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09816 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09807 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.00034 |
| scoring_system |
epss |
| scoring_elements |
0.09757 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00036 |
| scoring_system |
epss |
| scoring_elements |
0.10737 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00039 |
| scoring_system |
epss |
| scoring_elements |
0.1158 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34241 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-34241
|
| risk_score |
3.2 |
| exploitability |
0.5 |
| weighted_severity |
6.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-aznw-8yer-xfhf |
|
| 9 |
| url |
VCID-bzht-vhe3-y7bf |
| vulnerability_id |
VCID-bzht-vhe3-y7bf |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4180 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30171 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30176 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.3019 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40864 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40946 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40975 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.409 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.4095 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40957 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.0019 |
| scoring_system |
epss |
| scoring_elements |
0.40939 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4180 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| purl |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chf-23mc-d3dn |
|
| 1 |
| vulnerability |
VCID-3etj-2m21-ffa1 |
|
| 2 |
| vulnerability |
VCID-44ju-8618-vqht |
|
| 3 |
| vulnerability |
VCID-7wg4-sc9v-bffk |
|
| 4 |
| vulnerability |
VCID-993k-m3sq-gufu |
|
| 5 |
| vulnerability |
VCID-am36-6m5v-fkba |
|
| 6 |
| vulnerability |
VCID-apyh-1uza-pffa |
|
| 7 |
| vulnerability |
VCID-aznw-8yer-xfhf |
|
| 8 |
| vulnerability |
VCID-ev9c-v5dv-37fb |
|
| 9 |
| vulnerability |
VCID-k4yw-jg6v-1bcc |
|
| 10 |
| vulnerability |
VCID-p8gy-dd3u-uqh4 |
|
| 11 |
| vulnerability |
VCID-q8a8-fd7r-1kg7 |
|
| 12 |
| vulnerability |
VCID-qxwq-vp9g-ukca |
|
| 13 |
| vulnerability |
VCID-vx54-r2dt-8ue5 |
|
| 14 |
| vulnerability |
VCID-wqu4-wys6-hfbb |
|
| 15 |
| vulnerability |
VCID-zxp7-6d69-tfhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6 |
|
|
| aliases |
CVE-2018-4180
|
| risk_score |
3.5 |
| exploitability |
0.5 |
| weighted_severity |
7.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bzht-vhe3-y7bf |
|
| 10 |
| url |
VCID-ev9c-v5dv-37fb |
| vulnerability_id |
VCID-ev9c-v5dv-37fb |
| summary |
cups: heap based buffer overflow in libcups's ppdFindOption() in ppd-mark.c |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2020-3898 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37102 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37269 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37296 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37125 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37177 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.3719 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37201 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37167 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.3714 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00162 |
| scoring_system |
epss |
| scoring_elements |
0.37185 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2020-3898 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-3898
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ev9c-v5dv-37fb |
|
| 11 |
| url |
VCID-fkyp-m1p9-mfhy |
| vulnerability_id |
VCID-fkyp-m1p9-mfhy |
| summary |
cups: Invalid usernames handled in scheduler/ipp.c:add_job() allow remote attackers to cause a denial of service |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18248 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.76945 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.76951 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.7698 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.76962 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.76994 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77006 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77034 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77012 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77009 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.7705 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01002 |
| scoring_system |
epss |
| scoring_elements |
0.77052 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18248 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| purl |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chf-23mc-d3dn |
|
| 1 |
| vulnerability |
VCID-3etj-2m21-ffa1 |
|
| 2 |
| vulnerability |
VCID-44ju-8618-vqht |
|
| 3 |
| vulnerability |
VCID-7wg4-sc9v-bffk |
|
| 4 |
| vulnerability |
VCID-993k-m3sq-gufu |
|
| 5 |
| vulnerability |
VCID-am36-6m5v-fkba |
|
| 6 |
| vulnerability |
VCID-apyh-1uza-pffa |
|
| 7 |
| vulnerability |
VCID-aznw-8yer-xfhf |
|
| 8 |
| vulnerability |
VCID-ev9c-v5dv-37fb |
|
| 9 |
| vulnerability |
VCID-k4yw-jg6v-1bcc |
|
| 10 |
| vulnerability |
VCID-p8gy-dd3u-uqh4 |
|
| 11 |
| vulnerability |
VCID-q8a8-fd7r-1kg7 |
|
| 12 |
| vulnerability |
VCID-qxwq-vp9g-ukca |
|
| 13 |
| vulnerability |
VCID-vx54-r2dt-8ue5 |
|
| 14 |
| vulnerability |
VCID-wqu4-wys6-hfbb |
|
| 15 |
| vulnerability |
VCID-zxp7-6d69-tfhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6 |
|
|
| aliases |
CVE-2017-18248
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyp-m1p9-mfhy |
|
| 12 |
| url |
VCID-k4yw-jg6v-1bcc |
| vulnerability_id |
VCID-k4yw-jg6v-1bcc |
| summary |
cups: Cupsd Listen arbitrary chmod 0140777 |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-35235 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86826 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86756 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86776 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86773 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86793 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86802 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86815 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86811 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86807 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.03102 |
| scoring_system |
epss |
| scoring_elements |
0.86822 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-35235 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-35235
|
| risk_score |
2.0 |
| exploitability |
0.5 |
| weighted_severity |
4.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k4yw-jg6v-1bcc |
|
| 13 |
| url |
VCID-p8gy-dd3u-uqh4 |
| vulnerability_id |
VCID-p8gy-dd3u-uqh4 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26691 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09443 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00033 |
| scoring_system |
epss |
| scoring_elements |
0.09492 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10972 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10974 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10942 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10918 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10782 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10796 |
| published_at |
2026-04-18T12:55:00Z |
|
| 8 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10841 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.00037 |
| scoring_system |
epss |
| scoring_elements |
0.10917 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2022-26691 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| purl |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chf-23mc-d3dn |
|
| 1 |
| vulnerability |
VCID-3etj-2m21-ffa1 |
|
| 2 |
| vulnerability |
VCID-44ju-8618-vqht |
|
| 3 |
| vulnerability |
VCID-7wg4-sc9v-bffk |
|
| 4 |
| vulnerability |
VCID-993k-m3sq-gufu |
|
| 5 |
| vulnerability |
VCID-am36-6m5v-fkba |
|
| 6 |
| vulnerability |
VCID-apyh-1uza-pffa |
|
| 7 |
| vulnerability |
VCID-aznw-8yer-xfhf |
|
| 8 |
| vulnerability |
VCID-ev9c-v5dv-37fb |
|
| 9 |
| vulnerability |
VCID-k4yw-jg6v-1bcc |
|
| 10 |
| vulnerability |
VCID-p8gy-dd3u-uqh4 |
|
| 11 |
| vulnerability |
VCID-q8a8-fd7r-1kg7 |
|
| 12 |
| vulnerability |
VCID-qxwq-vp9g-ukca |
|
| 13 |
| vulnerability |
VCID-vx54-r2dt-8ue5 |
|
| 14 |
| vulnerability |
VCID-wqu4-wys6-hfbb |
|
| 15 |
| vulnerability |
VCID-zxp7-6d69-tfhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6 |
|
| 1 |
|
|
| aliases |
CVE-2022-26691, MNDT-2022-0026
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
6.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p8gy-dd3u-uqh4 |
|
| 14 |
| url |
VCID-pwkd-sgtt-1bef |
| vulnerability_id |
VCID-pwkd-sgtt-1bef |
| summary |
cups: DNS rebinding attacks via incorrect whitelist |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18190 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71939 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71947 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71966 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71943 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71981 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71993 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72017 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72001 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.71985 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72026 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.007 |
| scoring_system |
epss |
| scoring_elements |
0.72034 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-18190 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| purl |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chf-23mc-d3dn |
|
| 1 |
| vulnerability |
VCID-3etj-2m21-ffa1 |
|
| 2 |
| vulnerability |
VCID-44ju-8618-vqht |
|
| 3 |
| vulnerability |
VCID-7wg4-sc9v-bffk |
|
| 4 |
| vulnerability |
VCID-993k-m3sq-gufu |
|
| 5 |
| vulnerability |
VCID-am36-6m5v-fkba |
|
| 6 |
| vulnerability |
VCID-apyh-1uza-pffa |
|
| 7 |
| vulnerability |
VCID-aznw-8yer-xfhf |
|
| 8 |
| vulnerability |
VCID-ev9c-v5dv-37fb |
|
| 9 |
| vulnerability |
VCID-k4yw-jg6v-1bcc |
|
| 10 |
| vulnerability |
VCID-p8gy-dd3u-uqh4 |
|
| 11 |
| vulnerability |
VCID-q8a8-fd7r-1kg7 |
|
| 12 |
| vulnerability |
VCID-qxwq-vp9g-ukca |
|
| 13 |
| vulnerability |
VCID-vx54-r2dt-8ue5 |
|
| 14 |
| vulnerability |
VCID-wqu4-wys6-hfbb |
|
| 15 |
| vulnerability |
VCID-zxp7-6d69-tfhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6 |
|
|
| aliases |
CVE-2017-18190
|
| risk_score |
2.6 |
| exploitability |
0.5 |
| weighted_severity |
5.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-pwkd-sgtt-1bef |
|
| 15 |
| url |
VCID-q8a8-fd7r-1kg7 |
| vulnerability_id |
VCID-q8a8-fd7r-1kg7 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32324 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46866 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.4683 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46883 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46885 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46884 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46907 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.4688 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.00238 |
| scoring_system |
epss |
| scoring_elements |
0.46887 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00259 |
| scoring_system |
epss |
| scoring_elements |
0.49279 |
| published_at |
2026-04-16T12:55:00Z |
|
| 9 |
| value |
0.00259 |
| scoring_system |
epss |
| scoring_elements |
0.49276 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-32324 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-32324
|
| risk_score |
3.4 |
| exploitability |
0.5 |
| weighted_severity |
6.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q8a8-fd7r-1kg7 |
|
| 16 |
| url |
VCID-qxwq-vp9g-ukca |
| vulnerability_id |
VCID-qxwq-vp9g-ukca |
| summary |
In ippSetValueTag of ipp.c in Android 8.0, 8.1 and 9, there is a possible out of bounds read due to improper input validation. This could lead to local information disclosure from the printer service with no additional execution privileges needed. User interaction is not needed for exploitation. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-2180 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03833 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03824 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0383 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03868 |
| published_at |
2026-04-02T12:55:00Z |
|
| 4 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03878 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03892 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03897 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03922 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.0389 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03871 |
| published_at |
2026-04-12T12:55:00Z |
|
| 10 |
| value |
0.00017 |
| scoring_system |
epss |
| scoring_elements |
0.03845 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-2180 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-2180
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qxwq-vp9g-ukca |
|
| 17 |
| url |
VCID-vx54-r2dt-8ue5 |
| vulnerability_id |
VCID-vx54-r2dt-8ue5 |
| summary |
Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4504 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10426 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10307 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10494 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10354 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10427 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10491 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10522 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10489 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10466 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00035 |
| scoring_system |
epss |
| scoring_elements |
0.10334 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-4504 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-4504
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vx54-r2dt-8ue5 |
|
| 18 |
| url |
VCID-w17y-dvuq-7ba6 |
| vulnerability_id |
VCID-w17y-dvuq-7ba6 |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4181 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27942 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27951 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.00102 |
| scoring_system |
epss |
| scoring_elements |
0.27959 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39331 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39493 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39517 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39431 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39486 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39501 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39512 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00179 |
| scoring_system |
epss |
| scoring_elements |
0.39474 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-4181 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| purl |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chf-23mc-d3dn |
|
| 1 |
| vulnerability |
VCID-3etj-2m21-ffa1 |
|
| 2 |
| vulnerability |
VCID-44ju-8618-vqht |
|
| 3 |
| vulnerability |
VCID-7wg4-sc9v-bffk |
|
| 4 |
| vulnerability |
VCID-993k-m3sq-gufu |
|
| 5 |
| vulnerability |
VCID-am36-6m5v-fkba |
|
| 6 |
| vulnerability |
VCID-apyh-1uza-pffa |
|
| 7 |
| vulnerability |
VCID-aznw-8yer-xfhf |
|
| 8 |
| vulnerability |
VCID-ev9c-v5dv-37fb |
|
| 9 |
| vulnerability |
VCID-k4yw-jg6v-1bcc |
|
| 10 |
| vulnerability |
VCID-p8gy-dd3u-uqh4 |
|
| 11 |
| vulnerability |
VCID-q8a8-fd7r-1kg7 |
|
| 12 |
| vulnerability |
VCID-qxwq-vp9g-ukca |
|
| 13 |
| vulnerability |
VCID-vx54-r2dt-8ue5 |
|
| 14 |
| vulnerability |
VCID-wqu4-wys6-hfbb |
|
| 15 |
| vulnerability |
VCID-zxp7-6d69-tfhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6 |
|
|
| aliases |
CVE-2018-4181
|
| risk_score |
2.5 |
| exploitability |
0.5 |
| weighted_severity |
5.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-w17y-dvuq-7ba6 |
|
| 19 |
| url |
VCID-wqu4-wys6-hfbb |
| vulnerability_id |
VCID-wqu4-wys6-hfbb |
| summary |
cups: stack-buffer-overflow in libcups's asn1_get_type function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8675 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80524 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80553 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80574 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80584 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80601 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80587 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80607 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.8061 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8675 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-8675
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-wqu4-wys6-hfbb |
|
| 20 |
| url |
VCID-zjj3-g2d7-c3gd |
| vulnerability_id |
VCID-zjj3-g2d7-c3gd |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15400 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.6126 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.6134 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61369 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61338 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61385 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61401 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61422 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61407 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61388 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61427 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00411 |
| scoring_system |
epss |
| scoring_elements |
0.61431 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2017-15400 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| purl |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chf-23mc-d3dn |
|
| 1 |
| vulnerability |
VCID-3etj-2m21-ffa1 |
|
| 2 |
| vulnerability |
VCID-44ju-8618-vqht |
|
| 3 |
| vulnerability |
VCID-7wg4-sc9v-bffk |
|
| 4 |
| vulnerability |
VCID-993k-m3sq-gufu |
|
| 5 |
| vulnerability |
VCID-am36-6m5v-fkba |
|
| 6 |
| vulnerability |
VCID-apyh-1uza-pffa |
|
| 7 |
| vulnerability |
VCID-aznw-8yer-xfhf |
|
| 8 |
| vulnerability |
VCID-ev9c-v5dv-37fb |
|
| 9 |
| vulnerability |
VCID-k4yw-jg6v-1bcc |
|
| 10 |
| vulnerability |
VCID-p8gy-dd3u-uqh4 |
|
| 11 |
| vulnerability |
VCID-q8a8-fd7r-1kg7 |
|
| 12 |
| vulnerability |
VCID-qxwq-vp9g-ukca |
|
| 13 |
| vulnerability |
VCID-vx54-r2dt-8ue5 |
|
| 14 |
| vulnerability |
VCID-wqu4-wys6-hfbb |
|
| 15 |
| vulnerability |
VCID-zxp7-6d69-tfhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6 |
|
|
| aliases |
CVE-2017-15400
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zjj3-g2d7-c3gd |
|
| 21 |
| url |
VCID-zt43-htwu-kfde |
| vulnerability_id |
VCID-zt43-htwu-kfde |
| summary |
Multiple vulnerabilities have been found in CUPS, the worst of
which could result in the arbitrary execution of code. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-6553 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.34985 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35183 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35212 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35093 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35137 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35163 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35168 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35133 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35108 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35145 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.00147 |
| scoring_system |
epss |
| scoring_elements |
0.35131 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-6553 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| purl |
pkg:deb/debian/cups@2.2.10-6%2Bdeb10u6 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chf-23mc-d3dn |
|
| 1 |
| vulnerability |
VCID-3etj-2m21-ffa1 |
|
| 2 |
| vulnerability |
VCID-44ju-8618-vqht |
|
| 3 |
| vulnerability |
VCID-7wg4-sc9v-bffk |
|
| 4 |
| vulnerability |
VCID-993k-m3sq-gufu |
|
| 5 |
| vulnerability |
VCID-am36-6m5v-fkba |
|
| 6 |
| vulnerability |
VCID-apyh-1uza-pffa |
|
| 7 |
| vulnerability |
VCID-aznw-8yer-xfhf |
|
| 8 |
| vulnerability |
VCID-ev9c-v5dv-37fb |
|
| 9 |
| vulnerability |
VCID-k4yw-jg6v-1bcc |
|
| 10 |
| vulnerability |
VCID-p8gy-dd3u-uqh4 |
|
| 11 |
| vulnerability |
VCID-q8a8-fd7r-1kg7 |
|
| 12 |
| vulnerability |
VCID-qxwq-vp9g-ukca |
|
| 13 |
| vulnerability |
VCID-vx54-r2dt-8ue5 |
|
| 14 |
| vulnerability |
VCID-wqu4-wys6-hfbb |
|
| 15 |
| vulnerability |
VCID-zxp7-6d69-tfhm |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:deb/debian/cups@2.2.10-6%252Bdeb10u6 |
|
|
| aliases |
CVE-2018-6553
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.3 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zt43-htwu-kfde |
|
| 22 |
| url |
VCID-zxp7-6d69-tfhm |
| vulnerability_id |
VCID-zxp7-6d69-tfhm |
| summary |
cups: stack-buffer-overflow in libcups's asn1_get_packed function |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8696 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80524 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80531 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80553 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80545 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80574 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80584 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80601 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80587 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80579 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.80607 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.01419 |
| scoring_system |
epss |
| scoring_elements |
0.8061 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-8696 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-8696
|
| risk_score |
2.2 |
| exploitability |
0.5 |
| weighted_severity |
4.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zxp7-6d69-tfhm |
|